Business process management: a comprehensive survey
WMP Van der Aalst - International Scholarly Research Notices, 2013 - Wiley Online Library
Business Process Management (BPM) research resulted in a plethora of methods,
techniques, and tools to support the design, enactment, management, and analysis of …
techniques, and tools to support the design, enactment, management, and analysis of …
Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
A role-based access control model and reference implementation within a corporate intranet
DF Ferraiolo, JF Barkley, DR Kuhn - ACM Transactions on Information …, 1999 - dl.acm.org
This paper describes NIST's enhanced RBAC model and our approach to designing and
implementing RBAC features for networked Web servers. The RBAC model formalized in …
implementing RBAC features for networked Web servers. The RBAC model formalized in …
TRBAC: A temporal role-based access control model
Role-based access control (RBAC) models are receiving increasing attention as a
generalized approach to access control. Roles can be active at certain time periods and non …
generalized approach to access control. Roles can be active at certain time periods and non …
The ARBAC97 model for role-based administration of roles
In role-based access control (RBAC), permissions are associated with roles' and users are
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …
made members of roles, thereby acquiring the roles; permissions. RBAC's motivation is to …
访问控制模型研究进展及发展趋势
李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …
A generalized temporal role-based access control model
Role-based access control (RBAC) models have generated a great interest in the security
community as a powerful and generalized approach to security management. In many …
community as a powerful and generalized approach to security management. In many …
Towards comprehensive support for organizational mining
M Song, WMP Van der Aalst - Decision support systems, 2008 - Elsevier
Process mining has emerged as a way to analyze processes based on the event logs of the
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …
systems that support them. Today's information systems (eg, ERP systems) log all kinds of …
Access control in collaborative systems
W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …
problem. Collaborative systems often focus on building useful connections among people …
Configurable multi-perspective business process models
A configurable process model provides a consolidated view of a family of business
processes. It promotes the reuse of proven practices by providing analysts with a generic …
processes. It promotes the reuse of proven practices by providing analysts with a generic …